Teacher MOOC Shares Best Practices for Online Ed

The not-for-profit Blended Schools Network is hosting a new MOOC for K-12 educators focused on best practices in online teaching.

According to BSN, the seven-week MOOC, "Today's Online Teacher," will cover online teaching trends, techniques, and strategies, with emphasis on supporting online students, encouraging community-building, differentiating online instruction, and identifying problems that need intervention. It will also explore content creation and validation of course materials.

"Each week of the seven-week course includes a live session, course materials, sharing by participants, and feedback on projects," according to BSN. "It's also filled with opportunities for teachers to make connections and build a learning community. Throughout the course, teachers will get feedback on their work from experienced online teachers."

According to BSN Director of Professional Development Mark Radcliffe, "After completing our course, an online teacher will be ready to run a high quality course from beginning to end. We are focusing on making sure that each week's activities lead to immediate benefits for the teachers and their students."

David Nagel is editorial director of 1105 Media's Education Technology Group and editor-in-chief of THE Journal and STEAM Universe. A 25-year publishing veteran, Nagel has led or contributed to dozens of technology, art and business publications.

Sponsored Links

Webcasts

Whitepapers

Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Read more...